"Shopping Platform PandaBuy Data Leak Impacts 1.3 Million Users"

"Shopping Platform PandaBuy Data Leak Impacts 1.3 Million Users"

Have I Been Pwned (HIBP) recently announced that data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two threat actors exploited multiple vulnerabilities to breach systems.  PandaBuy allows international users to purchase products from various e-commerce platforms in China, including Tmall, Taobao, and JD.com.

Submitted by Adam Ekwall on

"Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor"

"Supply Chain Attack: Major Linux Distributions Impacted by XZ Utils Backdoor"

A supply chain attack involving backdoored versions of the XZ Utils data compression library has impacted major Linux distributions. According to Andres Freund, a Microsoft software engineer who discovered the backdoor, the malicious code was introduced in the tarball download package for XZ Utils version 5.6.0, which was released in February 2024. Version 5.6.1 was released shortly after, with updated malicious code that included more obfuscation and fixes for errors that occurred in some configurations.

Submitted by Gregory Rigby on

"Cybersecurity Attacks Have the Potential to Infiltrate Medical Devices and Cripple Health Care, Northeastern Expert Warns"

"Cybersecurity Attacks Have the Potential to Infiltrate Medical Devices and Cripple Health Care, Northeastern Expert Warns"

Kevin Fu, a Northeastern University professor of electrical and computer engineering and White House cybersecurity adviser, emphasized that the cyberattack on Change Healthcare should be a wake-up call for the healthcare industry to focus on securing its infrastructure. Although the recent attack mainly affected online billing and revenue systems, hackers can infiltrate medical devices that provide critical care. Fu suggests that healthcare providers consult with the Healthcare Sector Coordinating Council's Joint Security Plan for cybersecurity guidance.

Submitted by Gregory Rigby on

"AT&T Says Data on 73 Million Customers Leaked on Dark Web"

"AT&T Says Data on 73 Million Customers Leaked on Dark Web"

AT&T recently announced that data on roughly 73 million current and former customers was exposed on the dark web, including social security numbers and other personal information.  According to the company, the data set appears to be from 2019 or earlier, impacting approximately 7.6 million current AT&T account holders and approximately 65.4 million former account holders.  The source of the data is still being assessed.  The company said a “robust investigation” is underway, supported by internal and external cybersecurity teams.

Submitted by Adam Ekwall on

"Pervasive LLM Hallucinations Expand Code Developer Attack Surface"

"Pervasive LLM Hallucinations Expand Code Developer Attack Surface"

According to recent research published by the Large Language Model (LLM) security vendor Lasso Security, the use of LLMs by software developers provides a greater opportunity for attackers to distribute malicious packages to development environments than previously thought. The study is a follow-up to a report published last year on the possibility of attackers exploiting LLMs' tendency to hallucinate or generate seemingly plausible but factually incorrect results in response to user input.

Submitted by Gregory Rigby on

"2 Wireless Protocols Expose Mobile Users to Spying — The FCC Wants to Fix That"

"2 Wireless Protocols Expose Mobile Users to Spying — The FCC Wants to Fix That"

The Federal Communications Commission (FCC) is asking Communications Service Providers (CSPs) to give an update on how they are refurbishing their networks to prevent cybercriminals and spies from exploiting vulnerabilities in the Signaling System No. 7 (SS7) and Diameter protocols that enable malicious actors to track targets.

Submitted by Gregory Rigby on

"Why Our Data Might Need Protection From the Future"

"Why Our Data Might Need Protection From the Future"

Jonathan Katz, a computer science professor at the University of Maryland and expert in quantum-secure cryptography, explains Apple's recent post-quantum security move. Apple recently announced a major cryptographic security upgrade in iMessage, introducing PQ3, a post-quantum cryptographic protocol that advances end-to-end secure messaging. Katz noted that while today's hackers may be capable of stealing a password, they cannot crack the "cryptographic keys" that secure messages, at least not with the current generation of classical computers.

Submitted by Gregory Rigby on

"Decade-Old Linux 'Wall' Bug Helps Make Fake Sudo Prompts, Steal Passwords"

"Decade-Old Linux 'Wall' Bug Helps Make Fake Sudo Prompts, Steal Passwords"

According to security researcher Skyler Ferrante, a vulnerability dubbed "WallEscape" in the wall command of the util-linux package included with the Linux operating system could enable an unprivileged attacker to steal passwords or change the victim's clipboard. The security flaw has been present in all versions of the package for the past 11 years up to the recent 2.40 release. While the vulnerability demonstrates how an attacker can trick a user into giving up their administrator password, its exploitation is limited.

Submitted by Gregory Rigby on

"Privacy in an AI Era: How Do We Protect Our Personal Information?"

"Privacy in an AI Era: How Do We Protect Our Personal Information?"

The Artificial Intelligence (AI) era, which includes Large Language Models (LLMs) and chatbots, raises new privacy concerns. There are concerns about whether personal information is included in a model's training data.

Submitted by Gregory Rigby on

"'Uninvited Guests' Wins National Security Agency Award"

"'Uninvited Guests' Wins National Security Agency Award"

A team of researchers from Stony Brook University won the National Security Agency's (NSA) 11th Annual Best Scientific Cybersecurity Paper award for their paper titled "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots." The winning paper focused on autonomous systems that probe newly created websites. The Stony Brook researchers discovered tens of thousands of malicious bots involved in suspicious activities such as data exfiltration, reconnaissance, and vulnerability exploitation.

Submitted by Gregory Rigby on
Subscribe to